{"id":"UBUNTU-CVE-2021-23203","details":"Improper access control in reporting engine of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to download PDF reports for arbitrary documents, via crafted requests.","modified":"2026-01-20T17:23:09.086439Z","published":"2023-04-25T19:15:00Z","upstream":["CVE-2021-23203"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23203"},{"type":"REPORT","url":"https://github.com/odoo/odoo/issues/107695"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2021-23203"}],"affected":[{"package":{"name":"odoo","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/odoo@14.0.0+dfsg.3-1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["14.0.0+dfsg.2-7","14.0.0+dfsg.3-1"],"ecosystem_specific":{"binaries":[{"binary_version":"14.0.0+dfsg.3-1","binary_name":"odoo-14"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-23203.json"}},{"package":{"name":"odoo","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/odoo@16.0.0+dfsg.2-2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["16.0.0+dfsg.1-3","16.0.0+dfsg.2-1.1","16.0.0+dfsg.2-2"],"ecosystem_specific":{"binaries":[{"binary_version":"16.0.0+dfsg.2-2","binary_name":"odoo-16"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-23203.json"}},{"package":{"name":"odoo","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/odoo@18.0.0+dfsg-2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["18.0.0+dfsg-2"],"ecosystem_specific":{"binaries":[{"binary_version":"18.0.0+dfsg-2","binary_name":"odoo-18"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-23203.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}